-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to mount additional /dev devices like pts(4)? #71
Comments
the easy question has a complicated answer. |
For the gpg usage in jail, it seems that |
Makes sense. Thanks! |
A quick update: it looks like I can do
now in a jail after running References: |
What your command is doing is mounting again |
I am not sure if that is true. I do not mount it again. I just apply another rule set which allows more devices to be exposed in the jail.
This is true, but the default devfs rule set is not permissive enough for GnuPG to work properly.
It actually does work! I just successfully sent a signed email with mutt after being asked by the gpg agent to provide the passphrase. For future reference, I am using the following configuration of
Thanks a lot, @pizzamig! |
I am wondering what's the potonic way to allow more devices like pts(4) to a pot?
As a test case, I'd like to be able to execute a command like this:
A more real world use case would be being able to import password-protected secret keys with gpg in a jail. At the moment I'm getting the following errors:
PS A workaround for those errors is to specify
--pinentry-mode loopback
to the gpg command.The text was updated successfully, but these errors were encountered: